Cryptographic Versus Trust-based Methods for MANET Routing Security
暂无分享,去创建一个
[1] Todd Hughes,et al. Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .
[2] OpenSSL. OpenSSL : The open source toolkit for SSL/TSL , 2002 .
[3] Shambhu Upadhyaya,et al. Securing Information through Trust Management in Wireless Networks , 2004 .
[4] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[5] S. Upadhyaya,et al. Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .
[6] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[7] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[10] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[11] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[12] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[13] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[14] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[15] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[16] Chung-wei Lee,et al. Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.
[17] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[18] George N. Rouskas,et al. Networking 2004 , 2004, Lecture Notes in Computer Science.
[19] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[20] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[21] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[22] Yong Chen,et al. Trust Propagation in Small Worlds , 2003, iTrust.
[23] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[24] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[25] N. Pissinou,et al. Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[26] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[27] Brian L. Mark,et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.
[28] Alan Bundy,et al. Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.
[29] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[30] Markus Jakobsson,et al. Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[31] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[32] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[33] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[34] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[35] Niki Pissinou,et al. Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.
[36] Partha Dasgupta,et al. Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[37] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[38] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[39] Janne Lundberg. Routing Security in Ad Hoc Networks , 2000 .